CN2492979Y - Network isolator unit with identity confirmation - Google Patents

Network isolator unit with identity confirmation Download PDF

Info

Publication number
CN2492979Y
CN2492979Y CN 01246775 CN01246775U CN2492979Y CN 2492979 Y CN2492979 Y CN 2492979Y CN 01246775 CN01246775 CN 01246775 CN 01246775 U CN01246775 U CN 01246775U CN 2492979 Y CN2492979 Y CN 2492979Y
Authority
CN
China
Prior art keywords
network
computer
user
information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 01246775
Other languages
Chinese (zh)
Inventor
赵敏
王凯
项烨
邱凌云
王虹
吴菲菲
凌桂红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 01246775 priority Critical patent/CN2492979Y/en
Application granted granted Critical
Publication of CN2492979Y publication Critical patent/CN2492979Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The utility model provides a network isolation device with identity authentication, which includes a network selector and a hardware identity authentication deivice, wherein, the network selector is installed between the network interface of a client and any interface of the client and can physically isolate the hard disks of external networks connected with a computer from the confidential infrormation stored on the computer, and the hardware identity authentication deivice is installed in a computer network system and can be connected with the network selector. Because the utility model applies the network isolation device and the hardware identity authentication deivice, the network interface of the client is physically isolated from any interface of the client by the network selector. The hardware identity authentication deivice makes keyboard-entered user information, a password and other important information to be stored in the hardware password key of a user and transmitted by the method of encryption to a check computation device for decryption and verification, thus ensuring that a user with the legitimate identity can enter into the computer network, and therefore the security of the network is greatly increased.

Description

The network isolating device of band authentication
Technical field
The utility model relates to a kind of network interface hardware, specially refers to the Network Isolation interface hardware of band authentication.
Background technology
Development along with the internet; the intrusion people that avoid other network for network how to protect the subscriber computer place had once designed technology such as fire compartment wall; as Chinese patent ZL96109573.3 (invention and created name one firewall system); but these technology have all adopted the mode of software on solution, not from physically subscriber computer place network and other network being disconnected.It is again quite inconvenient adopting the manual mode that plugs netting twine to switch on different networks.For this reason, publication number is that the Chinese patent " network isolation system " of CN 1292533A discloses the i.e. switching between internal-external network of a kind of network selector realization user, thereby reaches physically isolation and the switching that is connected, to guarantee the safety of network.Yet, this network selector lacks identification authentication system, can't the identity of using be authenticated, flourish along with computer network, also more and more high for the security requirement of system resource and system's operation, this is because normal employing of disabled user stolen password, revising and forge the mode of validated user attacks system, make the resource and the operation of system can not get safety, wherein, user's identity is confirmed to be an important step of assurance system safety.If only adopt existing indentity identifying method promptly to adopt user password (password) to carry out authentication,, thereby make the safety of the operation of computer network system can not get good guarantee owing to easy decrypted being stolen of password (password).
Summary of the invention
The purpose of this utility model provide a kind of can guarantee computer network safer network isolating device.
To achieve these goals, the network isolating device that has identification authentication system that the utility model provides comprises:
One network selector, it is installed between subscriber computer network interface and the arbitrary interface of subscriber computer, the hard disk of the connection external network of computer and computer can be deposited secret information physically separates, simultaneous computer links to each other with plurality of network by described network selector, guarantees that interior at any time every computer only links to each other with a network physically; And
One is installed in the hardware accreditation device that can link to each other with above-mentioned network selector in the computer network system, and it comprises:
One available public-key cryptography to the private cipher key that it comprises encrypt, and available private cipher key hardware key that the private information of oneself is encrypted;
One links to each other with above-mentioned hardware key and receives the interface arrangement of the private information of the private cipher key of encryption of hardware key output and encryption;
The private cipher key of the encryption of one receiving interface device output and the private information of encryption also use the public-key cryptography of oneself to be decrypted the private cipher key that obtains the user, and with the private cipher key of this deciphering the private information of user's encryption is decrypted and judges user's legal identity and to utilize the authority that adopts system resource, and the checking computations device that the decryption information that is obtained is passed to control device and device systems is controlled.
Because the network isolating device of band authentication of the present utility model has adopted network isolating device and hardware accreditation device, has guaranteed physically to be separated by network selector between the arbitrary interface of subscriber computer network interface and subscriber computer.And the hardware accreditation device makes and to need hardware encryption that user profile, password and other important informations of keyboard input be stored in the user together on the key, and by cipher mode transmission checking computations device, be decrypted by the checking computations device, and confirm, thereby the user who guarantees legal identity enters computer network, and the fail safe of network is improved greatly.
Description of drawings
Fig. 1 is the work schematic diagram of network isolating device in system of the band authentication of an embodiment of the present utility model.
Fig. 2 is the workflow diagram of the described network selector of Fig. 1.
Fig. 3 is the fundamental diagram of the described identification authentication system of Fig. 1.
Fig. 4 is the structure principle chart of 3 described hardware keys.
Embodiment
Engaging accompanying drawing below is described in detail the utility model.
As shown in Figure 1, the present invention is only to dispose two-server, two hubs (HUB) and N platform computer and N the system design scheme that network selector 2 is formed for example.This system design scheme is one or several intermediate layers between the Internet (Internet) and the in-house network (Intranet), external server 1 control online by described two-server, link to each other with the Internet (Internet) through a hub (HUB), an internal server 5, link to each other with the Internet (Internet) through another hub (HUB), deposit the vital document on described each computer 3, described each computer 3 links to each other with plurality of network by described network selector, every computer 3 only linked to each other with a network physically in it can guarantee at any time, guaranteed the safety of the network system of in-house network (Intranet).Simultaneously,, leave the important information on described some the computers concentratedly, on described some computers, do not deposit vital document, also can generation information not have things stolen when linking to each other with the Internet (Internet) by disposing described internal server 5.Network selector links to each other with two-server, and this network selector can guarantee that at any time every computer 3 only links to each other with a network physically, guarantees the safety of internal network system.
A described N network selector is mounted on subscriber computer network interface and the arbitrary interface of subscriber computer: serial ports, parallel port, USB or PC go up on the various available expansion slot, it is a kind ofly to realize that the unique network in subscriber computer and two the above networks realizes the physical equipment that physics links to each other and switches, and the switching command that it accepts the Control Software transmission of network selector on the subscriber computer by various available expansion slot on serial ports, parallel port, USB or the PC at interior arbitrary PC interface is realized the physical connection of subscriber computer and specified network.
Described N network selector Control Software is to operate in user on the subscriber computer to carry out mutual and go up the computer program that various available expansion slot communicate with network selector by serial ports, parallel port, USB or PC.It can realize guaranteeing every computer 3 function that links to each other with a network physically.
A described N network selector is by operating in the Control Software of the described network selector on the subscriber computer, receive user's network switching command, switching command is passed through the arbitrary interface of subscriber computer with certain form: serial ports, parallel port, USB or PC go up various available expansion slot, send to described network selector, by it switching command is made an explanation, and the physical connection of realization and corresponding network.
As shown in Figure 2,2 Control Software of the network selector on subscriber computer receive the user and switch to network X nInstruction after, this software promptly sends to PC interfaces such as serial ports, parallel port, USB interface or bus interface and switches to network X nInstruction switches to network X when network selector receives nInstruction after, promptly cut off the physical connection of subscriber computer, and the physical connection of switching described user is to network X to the network that networks nThereby, finish the switching of network.
As shown in Figure 3, the network isolating device of the band authentication that provides of the utility model comprises identification authentication system and network selector.Identification authentication system comprises hardware key 9, interface arrangement 10, checking computations device 12 and control device 15.In the present embodiment, network selector 2 is made of one with checking computations device 12, and certainly, they can separate.Wherein, checking computations device 12 and control device 15 are installed in the device systems 16.Hardware key 9 links to each other with the checking computations device 12 of device systems 16 by interface arrangement 10, and can be to device systems 16 transmission information.Checking computations device 12 links to each other with control device 15, and can carry out information exchange.
In said system, the hardware key 9 of user's hardware system has the private cipher key of oneself and the public-key cryptography of available checking computations device is encrypted the private cipher key of oneself, be sent to checking computations device 12 then, and, the secret information (private information) that will transmit is encrypted with the private cipher key of oneself, then the file after encrypting is sent to checking computations device 12.Obtain the private cipher key of user's hardware system and secret information (private information) is decrypted the true identity of judging the user after the public-key cryptography of checking computations device 12 usefulness oneself is decrypted private cipher key, thereby determine whether to allow to use the corpse login system with this private cipher key.In the present invention, the user is held the secret information of carrying to encrypt by " rivest, shamir, adelman ", and use specific transfer approach to check user's legal identity or checking holder's identity and log-on message.
Referring to Fig. 4, hardware key 9 comprises that interface circuit 18, microprocessor 19 and electricity can wipe access memory (EEPRAM) 20.Interface circuit 18 links to each other with system and gets in touch with this system communication.Microprocessor 19 links to each other with interface circuit and electricity can be able to be wiped the information that access memory (EEPRAM) 20 stores and encrypt, and sends in the interface circuit 18.Electricity can be wiped access memory (EEPRAM) 20 and user's private information and private cipher key that interface circuit 18 transmits can be stored.
The course of work of Verification System provided by the invention is as follows:
System sends instruction to checking computations device 12 when powering on start, require 12 pairs of login users of checking computations device to carry out identity validation.Checking computations device 12 sends instruction by interface arrangement 10 to hardware key 9 after receiving instruction.Hardware key 9 is adorned 123 public-key cryptography with oneself a private cipher key with checking computations the key of oneself is encrypted, be sent to checking computations device 12 then, simultaneously private informations (secret information) such as the user's that will transmit identity, password are encrypted with own private cipher key, the information after encrypting is sent to checks device 12 then.Checking computations device 12 public-key cryptography with oneself after receiving above-mentioned series information is decrypted, and obtains the private cipher key of user's hardware system.Like this, checking computations device 12 can be decrypted the legal identity of judging the user and the authority of utilizing system resource to private information with this private cipher key, and getting real information is passed to control device 15.Control device 15 carries out respective handling according to the instruction of checking computations device 12 to device systems.After system powers on, checking computations device 12 generals periodically send the checking instruction to the hardware system of system, if 12 couples of users' of checking computations device key information checking computations are also differentiated the back and are confirmed that the user is legal, then allow the online using system resource of this user, if authentication failed or user's off-line, checking computations device 12 will notify control system to close whole system 16.
In addition, can comprise a tape deck in the described checking computations device 12, it can be connected on the device systems the user the using system resource carry out record for information about so that checking computations device 12 constantly compares affirmation.This tape deck also can be placed in the computer system.
Verification System provided by the invention can be installed in the checking computations device on all kinds of computers, the system that certain private information (secret information) of carrying of holding by the user (user's intelligence hardware system) verifies, login with legal identity, comprise: security system, network communication system, information interaction system, card-reading system, terminal equipment and definite serial line interface, the authentication of all kinds of communication interface equipment such as PCI IDEISA of parallel interface, USB PC.
The present invention is owing to adopt above-mentioned structure, has the compatible fully function of safety identification authentication system, but use the hardware encryption key, utilize its characteristic will need user's letter of keyboard input, password and other important informations are stored in hardware encryption that the user carries on the key together, be delivered on the Verification System by the mode of encrypting, visual user logined authentication be converted into sightlessly, this just begins information security is controlled from hardware layer.
In addition,, can find that native system has the function of following some authentication by detailed description to identity authorization system of the present invention:
Credible: as to guarantee that the login identity is believable.Be that the information that the registrant sends is sent out by the jactitator.
Integrality: require the registrant its hardware identity must be connected in the system in the whole process of using system resource.Be that the registrant in use is not replaced non repudiation because user's hardware identity is connected in the system, the registrant is noted down by system for information about the using system resource, and the user can't deny.
Control visit property: refusal disabled user access system resources, validated user can only the access system mandates and the resource of appointment.

Claims (4)

1, a kind of network isolating device with authentication is characterized in that comprising:
One network selector, it is installed between subscriber computer network interface and the arbitrary interface of subscriber computer, the hard disk of the connection external network of computer and computer can be deposited secret information physically separates, simultaneous computer links to each other with plurality of network by described network selector, guarantees that interior at any time every computer only links to each other with a network physically; And
One is installed in the hardware accreditation device that can link to each other with above-mentioned network selector in the computer network system, and it comprises:
One available public-key cryptography to the private cipher key that it comprises encrypt, and available private cipher key hardware key that the private information of oneself is encrypted;
One links to each other with above-mentioned hardware key and receives the interface arrangement of the private information of the private cipher key of encryption of hardware key output and encryption;
The private cipher key of the encryption of one receiving interface device output and the private information of encryption also use the public-key cryptography of oneself to be decrypted the private cipher key that obtains the user, and with the private cipher key of this deciphering the private information of user's encryption is decrypted and judges user's legal identity and to utilize the authority that adopts system resource, and the checking computations device that the decryption information that is obtained is passed to control device and device systems is controlled.
2, the network isolating device of band authentication as claimed in claim 1, it is characterized in that: comprise a tape deck in the described checking computations device, it can will be connected user on the device systems at the record for information about of using system resource, so that the checking computations device constantly compares the tape deck of affirmation.
3, the network isolating device of band authentication as claimed in claim 1 is characterized in that described hardware key comprises:
One electricity that user profile and private cipher key can be stored can be wiped access memory (EEPRAM);
One close with computer system and with the interface circuit of this system communication contact;
One can wipe the microprocessor that access memory links to each other with the interface circuit electricity, and this microprocessor can be wiped the information that stores in the random access memory to electricity and encrypt, and sends in the interface circuit.
4, the network isolating device of band authentication as claimed in claim 1 is characterized in that described network selector and checking computations device are made of one.
CN 01246775 2001-07-27 2001-07-27 Network isolator unit with identity confirmation Expired - Fee Related CN2492979Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01246775 CN2492979Y (en) 2001-07-27 2001-07-27 Network isolator unit with identity confirmation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01246775 CN2492979Y (en) 2001-07-27 2001-07-27 Network isolator unit with identity confirmation

Publications (1)

Publication Number Publication Date
CN2492979Y true CN2492979Y (en) 2002-05-22

Family

ID=33657733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01246775 Expired - Fee Related CN2492979Y (en) 2001-07-27 2001-07-27 Network isolator unit with identity confirmation

Country Status (1)

Country Link
CN (1) CN2492979Y (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1321513C (en) * 2003-04-16 2007-06-13 三星电子株式会社 Device and method for connecting separate networks
CN100440238C (en) * 2005-08-04 2008-12-03 株式会社知识潮 Computer controlling method and system by externally connected device
CN1925401B (en) * 2006-10-12 2011-06-15 中国联合网络通信有限公司北京市分公司 Internet access system and method
CN101667140B (en) * 2008-09-03 2013-02-13 联想(北京)有限公司 Method, device and system for controlling switching of operating systems
CN101640595B (en) * 2008-07-28 2015-03-25 联想(北京)有限公司 Method, device and system for controlling switching of isolation card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1321513C (en) * 2003-04-16 2007-06-13 三星电子株式会社 Device and method for connecting separate networks
CN100440238C (en) * 2005-08-04 2008-12-03 株式会社知识潮 Computer controlling method and system by externally connected device
CN1925401B (en) * 2006-10-12 2011-06-15 中国联合网络通信有限公司北京市分公司 Internet access system and method
CN101640595B (en) * 2008-07-28 2015-03-25 联想(北京)有限公司 Method, device and system for controlling switching of isolation card
CN101667140B (en) * 2008-09-03 2013-02-13 联想(北京)有限公司 Method, device and system for controlling switching of operating systems

Similar Documents

Publication Publication Date Title
US8971537B2 (en) Access control protocol for embedded devices
US5491752A (en) System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
US7231526B2 (en) System and method for validating a network session
EP2021938B1 (en) Policy driven, credential delegation for single sign on and secure access to network resources
US5483596A (en) Apparatus and method for controlling access to and interconnection of computer system resources
US6981156B1 (en) Method, server system and device for making safe a communication network
CN111770088A (en) Data authentication method, device, electronic equipment and computer readable storage medium
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
CN1635738A (en) General authentication authorization service system and method
EP2926527B1 (en) Virtual smartcard authentication
CN106027467A (en) Identity card reading response system
CN2492979Y (en) Network isolator unit with identity confirmation
CN1180566C (en) Method of realizing safe and reliable interconnection between network equipments
Xia et al. Design of secure FTP system
CN116684875A (en) Communication security authentication method for electric power 5G network slice
CN201717885U (en) Code providing equipment and code identification system
CN106027477A (en) Identity card reading response method
Zou et al. Information Security Transmission Technology in Internet of Things Control System.
CN105991649B (en) A kind of scheduling system of reading identity card
CN105991648B (en) A kind of dispatching method of reading identity card
CN2492980Y (en) Hardware cipher key idnetity confirmation unit
CN111641646A (en) Safety enhancement type communication positioning terminal
CN1400766A (en) Hardware accreditation system
CN114785566B (en) Data processing method, device and equipment

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee